Abstract. Two methods to implement privacy in network communication, anonymity and DCSC (data confidentiality and secure computation) are analysed and compared in regard to privac...
One of the key arguments for mobile agent systems is the flexible usage of groups of agents. However, none of the existing mobile agent systems supports agent groups. In this pap...
Although mobile agents are a promising technology, the large-scale deployment of agents and the existence of hosts running agencies will not happen until proper security mechanism...